Hi [[ session.user.profile.firstName ]]

Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Us

Most major enterprise data breaches begin with an attempt to fool a single user on your network. Whether they are targeting top executives, financial decision makers, or IT people who maintain passwords and credentials, today’s cyberattackers often are going after specific individuals in your organization. And as the holiday shopping season begins, these attacks on individuals may become easier – and more frequent.

In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted “spearphishing” attacks. You’ll get insight on how the attackers choose their social engineering targets, the methods they use to find out about those individuals, and the exploits they execute to fool specific users into giving up sensitive information. You’ll also get recommendations on how to prevent this early reconnaissance, as well as the attacks themselves, and how to train your users to recognize an attack before it creates a compromise.
Recorded Nov 15 2016 71 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ERICH KRON, SECURITY AWARENESS ADVOCATE, KNOWBE4
Presentation preview: Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Us

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Sep 28 2020 73 mins
    Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as he joins Cyber Defense Media Group's Gary Miliefsky for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Your Ransomware Task Force: Critical Steps for Responding to a Ransomware Attack Recorded: Sep 25 2020 61 mins
    Roger Grimes (KnowBe4), John Mullen (Mullen Coughlin)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    To help you prepare for a rapid response Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, interviewed John Mullen, of Mullen Coughlin LLC, who is a seasoned, hands-on ransomware and data loss professional. John has served as a “Breach Coach” to thousands of affected organizations to help them contain and investigate ransomware attacks.

    In this session you’ll learn:

    - The number one mistake most ransomware victims are making today
    - When you need to call a “Breach Coach” and what they can do to help
    - Rapid response steps you need to take when your organization gets hit
    - Why new-school security awareness training is more critical than ever before
  • Your Ransomware Task Force: Extortion, Crisis Management and Recovery Recorded: Sep 25 2020 59 mins
    Roger Grimes (KnowBe4), Bill Hardin (Charles River Associates)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    Watch this on-demand webinar where Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, interviews Bill Hardin of Charles Rivers Associates for an exclusive webinar, Ransomware Expert Guide: Extortion, Crisis Management, and Recovery. Roger and Bill take a deep dive into ransomware forensics and recovery to help you prepare for a rapid response before a ransomware attack affects your organization.

    In this session you’ll learn:

    - Of the thousands of cyber events Bill has investigated what is different in 2020
    - Tactics and techniques your security team can use to hunt within your environment
    - Bill’s top 3 takeaways regarding ransomware recovery
    - How to enable your users to spot suspicious attacks before they affect you
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain Recorded: Sep 24 2020 59 mins
    James McQuiggan
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate Links Recorded: Sep 23 2020 61 mins
    Roger Grimes
    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

    Join us for this webinar when Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, shows you how to become a rogue URL expert.

    He’ll dive deep into the latest techniques and defenses to share:

    - Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
    - Safe forensic methods for examining URLs and other tactics for investigating phishy emails
    - Strategies for dissecting URLs on mobile without clicking
    - Simple ways you can train your users to scrutinize URLs and keep your network safe
  • Think Like a Hacker: Learn How to Use OSINT to Defend Your Organization Recorded: Sep 22 2020 57 mins
    Rosa Smothers, SVP of Cyber Operations at KnowBe4
    In today's digital age we are surrounded by massive amounts of data every day. This makes it ridiculously easy to gather shockingly detailed information about anyone… even your organization. Bad actors use open source intelligence (OSINT) techniques to gather this inside knowledge and create attacks your users will click on. No one knows this better than former CIA Cyber Threat Analyst and Technical Intelligence Officer, Rosa Smothers. But she can show you how to use OSINT to turn the tables on the bad guys and regain the upper hand.

    Join us as Rosa, now KnowBe4's SVP of Cyber Operations shares her insights on how to leverage OSINT to defend your organization and think like a hacker!

    Rosa will show you:

    How to go beyond general OSINT techniques to gather the details you need for effective investigations

    Apps and analytic techniques that enhance your research and data interpretation

    Live demonstrations of OSINT gathering techniques you can use before the bad guys do

    How training your users to understand OSINT and their digital footprint can protect your organization from threat actors

    Learn how to use hackers' best techniques against them!
  • You've Got Humans on Your Network! Recorded: Sep 22 2020 71 mins
    Joanna Huisman (KnowBe4), Dr. Christopher Pierson (BlackCloak), Trip Hillman (Weaver), Tom Bechtold (SecureWorld)
    They are all over your network doing all sorts of things with company data. Most of them are doing exactly what they are supposed to be doing. Nothing new to report there but do you know who they all are? Should they have that level of access? Why is Carol in accounting downloading 1 TB of data? Did John in sales just send the competitors a price list? When is the last time you REALLY did some security awareness training besides that one video you sent 6 months ago?

    Now people are working from home. Who is using this corporate device? Where did this Chromebook come from on the network?

    We have a lot of questions and a lot of work ahead of us as it relates to the human element and Information Security. Some say there is are technical controls we need to put in place. Some say it is merely adopting a company culture shift toward security. The truth is probably somewhere in the middle. Bring our panelists your questions and let’s help our end-users!
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Sep 22 2020 103 mins
    Roger Grimes (KnowBe4), Sam Masiello (Gates Corporation), Tom Bechtold (SecureWorld)
    Join Roger Grimes, SecureWorld's Tom Bechtold, and Gates Corporation CISO Sam Masiello as they discuss the ever changing (and scary) world of ransomware.

    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    They dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • Why the Human Factor is Still the Most Important Part of IT Security Recorded: Sep 21 2020 61 mins
    Rosa Smothers (KnowBe4), Teri Takai (Center for Digital Government)
    Smart network security involves a mix of hardware and software solutions designed to safeguard your data. But there’s another key security factor that’s just as vital, and it’s one that’s frequently neglected by technologists: the human element. Understanding the human risk factor and the role it plays in creating network vulnerabilities is vital to ensuring that your systems and your data are safely protected.

    And it’s never been more important for state and local tech leaders to get it right. The shutdowns and economic turmoil of the coronavirus pandemic have created a new world that’s ripe for hackers and scammers.
    Ransomware and malware attacks are up, and users working from home are more susceptible to phishing attempts and other attempts to gain access to your network. If you’re not focusing on the human element, you’re ignoring a crucial part of your overall security program.

    In this one-hour webinar, a panel of experts and thought leaders will discuss important topics including:

    - Why your users are your most important line of defense, and how you can build and empower your “human firewall”
    - How Covid-19 has reshaped the threat landscape, and how that will be affected by the economic crisis
    - What you can do now to make your organization a hard target for bad actors
    - How security awareness training can enable your employees to make smarter security decisions every day
  • It All Started with a Phish... Recorded: Sep 16 2020 60 mins
    Roger Grimes (Data-Driven Defense Evangelist, KnowBe4), David Bayer (VP Program Management & Product Marketing, Vailmail)
    We all have come to understand that most of the successful breaches started with a phishing attack. Through use of technologies such as DMARC, DKIM, SPF, MFA, and a host of great vendor solutions we can get our arms around this threat. Technologically. But people are people and we love to click on stuff. Now, we must get our employees involved in the shared responsibility of security and awareness. So, people are the answer? This panel will discuss how we carefully blend People, Process, and Technology to strengthen the organization together.
  • The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You Recorded: Sep 16 2020 60 mins
    Roger Grimes, David Littman
    With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will. Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. He’ll show you: • The two best questions to ask to prevent malware and ransomware • The most common ways malware gets around your defenses • A live malware demonstration and how you can prevent it immediately • Step-by-step action plans you can start implement now • How to enable your end users to become your best, last line of defense Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.
  • Ransomware Hostage Rescue Manual 2020 Recorded: Sep 10 2020 61 mins
    Erich Kron
    Ransomware attacks are on the rise — and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.

    In this webcast we will cover:
    · What new scary ransomware strains are in the wild
    · Am I infected?
    · I’m infected, now what?
    · Proven methods of protecting your organization?
    · How to create a “human firewall”

    Don’t get held hostage and become a statistic! Join us to learn how to avoid these scary attacks.
  • Stump the Shark: Ask Roger Grimes Your Most Burning IT Security Questions! Recorded: Sep 10 2020 62 mins
    Roger Grimes, Erich Kron
    Have you ever wanted to pick the brain of one of the most prolific IT security experts? Now is your chance! In our “Ask Me Anything” session with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

    Roger is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 12 books and over 1,000 magazine articles on computer security. He is itching to share his knowledge with YOU!

    Ask Roger anything, from your most burning IT security questions, how to get your security awareness program off the ground, or how he got his start in the industry. Try to stump him with your hardest questions! This session will be moderated by Erich Kron, KnowBe4's Security Awareness Advocate.

    You won’t want to miss this opportunity to chat with Roger and Erich!
  • The Mind’s Lie: How our Thoughts and Actions can be Hacked and Hijacked Recorded: Sep 10 2020 20 mins
    Perry Carpenter
    Discover the art and science behind deception… and why you may still fall for dirty tricks even after you understand how they work. From the slight-of-hand used by magicians, to the slight-of-tongue used by politicians, we are all wired to deceive and to be deceived. See how threat actors use these techniques against your users and how security awareness training can help them spot deceptions before it’s too late.
  • Find Out How to Use Your Organization's Data to Become a Risk Management Expert Recorded: Sep 9 2020 52 mins
    Roger Grimes
    Risk management is about recognizing the right risks, assigning the right likelihood, and assessing potential damage. Yet, most risk managers are doing it wrong, driven by decades of faulty risk management measurements and tools.

    Learn how you can use your organization's data to create new risk models that map to your real risk and apply a data-driven defense approach to identify the critical threats that your organization actually faces.

    Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, a 30-year security veteran and former auditor who has passed the CPA and CISA exams for this insightful presentation.

    Roger will show you:

    - How most risk managers are taught to calculate risk and why that's incorrect
    - How you can fix your risk calculation
    - How to use your own data to create new risk models that better map to your organization’s real risk
    - How to create a data-driven risk management plan using governance, risk management and compliance tools
  • Cyber CSI: Learn How to Forensically Examine Phishing Emails Recorded: Aug 20 2020 85 mins
    Roger Grimes (KnowBe4), Tom Bechtold (SecureWorld)
    Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator! You’ll learn:

    - How to forensically examine phishing emails and identify other types of social engineering
    - What forensic tools and techniques you can use right now
    - How to investigate rogue smishing, vishing, and social media phishes
    - How to enable your users to spot suspicious emails sent to your organization

    Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
  • The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You Recorded: Aug 20 2020 61 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.

    Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about.

    He’ll show you:

    - The two best questions to ask to prevent malware and ransomware
    - The most common ways malware gets around your defenses
    - A live malware demonstration and how you can prevent it immediately
    - Step-by-step action plans you can start implement now
    - How to enable your end users to become your best, last line of defense

    Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.
  • Ask Me Anything with Kevin Mitnick - The World’s Most Famous Hacker Recorded: Aug 14 2020 41 mins
    Kevin Mitnick, KnowBe4's Chief Hacking Officer and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer
    *From Black Hat USA 2020*

    Ever want to pick the brain of The World’s Most Famous Hacker? This is your chance! Kevin Mitnick will share stories from trenches and answer questions in this unique and informative session. Plus, he'll share an eye-opening hacking demo. You don't want to miss this one-of-a-kind session!
  • Dark Reading Interviews Roger Grimes about Data-Driven Defense Recorded: Aug 14 2020 11 mins
    Terry Sweeney, Dark Reading Contributing Editor and Roger Grimes, KnowBe4's Data-Driven Defense Evangelist
    Terry Sweeney, a Contributing Editor with Dark Reading, speaks with Roger Grimes, KnowBe4's Data-Driven Defense Evangelist in preparation for Black Hat USA 2020. They discuss what data-driven defense means and how organizations can put the concept to work in their own organizations.
  • SecureWorld Panel: Cybercriminals at Work Recorded: Aug 11 2020 64 mins
    Roger Grimes (KnowBe4), Ashley Stephenson (Corero Networks), Colonel Cedric Leighton, Bruce Sussman (SecureWorld)
    Modern civilization has always been plagued by various classes of criminals. The advent of interconnected devices, allowing for portability of corporate secrets, has given rise to a completely different class of nefarious actors. Cybercriminals range from those bent on stealing your personal information to "cyber terrorists" who have the capability to inflict harm on a much wider scale. Uninhibited by current laws, they are very effective given the speeds of networks, lack of appropriate security controls, and the anonymous nature of the attacker. Making matters worse, the crime may be perpetrated by entities outside of the legal jurisdiction where the unlawful act took place.

    This panel discussion will explore the tools these criminals use, what can be done to prevent them, and how to safeguard your data.
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Us
  • Live at: Nov 15 2016 4:15 pm
  • Presented by: ERICH KRON, SECURITY AWARENESS ADVOCATE, KNOWBE4
  • From:
Your email has been sent.
or close